Follow
Carlos V Rozas
Title
Cited by
Cited by
Year
Innovative instructions and software model for isolated execution.
F McKeen, I Alexandrovich, A Berenzon, CV Rozas, H Shafi, ...
Hasp@ isca 10 (1), 2013
14982013
Method for securely distributing a conditional use private key to a trusted entity on a remote system
GL Graunke, J Carbajal, RL Maliszewski, CV Rozas
US Patent 5,991,399, 1999
7041999
Catalyst: Defeating last-level cache side channel attacks in cloud computing
F Liu, Q Ge, Y Yarom, F Mckeen, C Rozas, G Heiser, RB Lee
2016 IEEE international symposium on high performance computer architecture …, 2016
4902016
IntelŽ software guard extensions (intelŽ sgx) support for dynamic memory management inside an enclave
F McKeen, I Alexandrovich, I Anati, D Caspi, S Johnson, R Leslie-Hurd, ...
Proceedings of the Hardware and Architectural Support for Security and …, 2016
3112016
Intel software guard extensions: EPID provisioning and attestation services
S Johnson, V Scarlata, C Rozas, E Brickell, F Mckeen
White Paper 1 (1-10), 119, 2016
2252016
Technique for supporting multiple secure enclaves
SP Johnson, UR Savagaonkar, VR Scarlata, FX McKeen, CV Rozas
US Patent 8,972,746, 2015
1912015
Method and apparatus for verifying the integrity of digital objects using signed manifests
JM Carbajal, G Graunke, C Rozas
US Patent 6,725,373, 2004
1402004
Method and apparatus to provide secure application execution
FX McKeen, CV Rozas, UR Savagaonkar, SP Johnson, V Scarlata, ...
US Patent 9,087,200, 2015
1262015
Method and apparatus for integrity verification, authentication, and secure linkage of software modules
GL Graunke, CV Rozas
US Patent 6,105,137, 2000
1162000
Method and apparatus for key provisioning of hardware devices
EF Brickell, S Gueron, J Li, CV Rozas, D Nemiroff, VR Scarlata, ...
US Patent App. 12/956,793, 2012
1142012
Method and apparatus for providing secure virtualization of a trusted platform module
VR Scarlata, CV Rozas
US Patent 7,590,867, 2009
1142009
Shared cryptographic key in networks with an embedded agent
D Durham, V Zimmer, C Smith, R Yavatkar, T Schluessler, D Larson, ...
US Patent App. 10/809,315, 2005
1012005
Method, apparatus and system for monitoring system integrity in a trusted computing environment
C Rozas
US Patent App. 10/738,498, 2005
942005
Memory isolation and virtualization among virtual machines
M Vij, CV Rozas, K Ranganathan
US Patent 7,640,543, 2009
852009
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
802014
Associating a multi-context trusted platform module with distributed platforms
CV Rozas
US Patent 8,108,668, 2012
782012
Method and apparatus for providing software-based security coprocessors
VR Scarlata, CV Rozas
US Patent 7,587,595, 2009
752009
Cooperative embedded agents
DM Durham, VJ Zimmer, CW Smith, R Yavatkar, TT Schluessler, ...
US Patent 7,653,727, 2010
732010
Trusted packet processing for multi-domain separatization and security
K Sood, S Chakrabarti, W Shen, CV Rozas, M Vij, VR Scarlata
US Patent 10,528,721, 2020
722020
Speculative interference attacks: Breaking invisible speculation schemes
M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ...
Proceedings of the 26th ACM International Conference on Architectural …, 2021
682021
The system can't perform the operation now. Try again later.
Articles 1–20